Preferred Language
Articles
/
ijs-1686
A Study of Graph Theory Applications in IT Security
...Show More Authors

The recent developments in information technology have made major changes in all fields. The transfer of information through networks has become irreplaceable due to its advantages in facilitating the requirements of modern life through developing methods of storing and distributing information. This in turn has led to an increase in information problems and risks that threaten the security of the institution’s information and can be used in distributed systems environment.

This study focused on two parts; the first is to review the most important applications of the graph theory in the field of network security, and the second is focused on the possibility of using the Euler graph as a Method Object that is employed in Remote Method Invocation (RMI) technique. This algorithm was compared with the most popular algorithms, such as RSA and 3DES. The results were acceptable and need to be improved in the future.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 25 2023
Journal Name
College Of Islamic Sciences
The rule (it is desirable to leave the dispute) and its importance in the life of a Muslim
...Show More Authors

Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers, and upon his family and companions

And whoever follows his guidance until the Day of Judgment. As for what follows: Islamic law commands Muslims to unite, reject disagreement, and not dispute, and to spread the spirit of tolerance and love among them. God Almighty said: “And hold fast to the rope of God all of you and do not become divided, and remember the favor of God upon you when you are enemies and He has joined your hearts.” So, by His grace, you became brothers (1), and He said: (And You will be like those who became divided and disagreed after the clear proofs had come to them. It is they - for them is a great punishment.) (2

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Isolation and identification of Bacillus stearothermophilus and study the inhibition effect of squeezed grape waste extract on it.: Isolation and identification of Bacillus stearothermophilus and study the inhibition effect of squeezed grape waste extract on it.
...Show More Authors

The aim of this study was to know the inhibition activity of squeezed grape waste extract on Bacillus stearpthermophilus by using three different tempretures degree 40, 60 and 80c, in order to reduce the time exposure of food for preservation. This study include two branchs: First: isolation and identification of Bacillus stearothermophilus from soil, 5 sample were collected from the soil of the college agriculture/Baghdad university. Samples were cultured on nutrient agar, microscopic and culturing tests were conducted and many biochemical tests were done. The isolates were cultivated at 55 c and 65 c for differentiate it from Bacillus coagulans which is can't grow at 65 co. The c

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Study of some electronic and spectroscopic properties of ZnO nanostructers by density functional theory
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Leader-member Exchange Theory in Strengthening Job Satisfaction (Analytical study of the asiacell telecommunications company)
...Show More Authors

The research aims to formulate a model for research on the dimensions of the Leader-member exchange theory according to the ideas and thoughts of Liden /Maslyn, Hammer and impact on job satisfaction and measure these dimensions at asiacell communications to identify the extent of convergence between theoretical dimensions share leader – member Exchange (LMX) with leadership style used in this company, we have been building scale contains two variables, independent variable Leader-member exchange theory five dimensions (effect , Loyalty, contribution, respect professional, and support) the certified job satisfaction variable dimensions (job security, The Style of management, organizational climate, appreciation, and work itself)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
The Calculations of Wiener μ-invariant and someTopological Indices on the Corona Graph
...Show More Authors

A topological index, commonly referred to as a connectivity index, is a molecular structural descriptor that describes a chemical compound's topology. Topological indices are a major topic in graph theory. In this paper, we first define a new graph, which is a concept from the coronavirus, called a corona graph, and then we give some theoretical results for the Wiener and the hyper Wiener index of a graph, according to ( the number of pairs of vertices (u, v) of G that are at a distance . Moreover, calculate some topological indices degree-based, such as the first and second Zagreb index, ,  and  index, and first and second Gourava index for the recent graph. In addition, we introduced a new topological index, the , w

... Show More
View Publication
Crossref
Publication Date
Sun Apr 17 2016
Journal Name
جلة ابن الهيثم للعلوم الصرفةم
isolation and partial purification of cell wall lipopolysaccharides of pseduomonas areuginosa and using it as Vaccine it
...Show More Authors

Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Robust Password Encryption Technique with an Extra Security Layer
...Show More Authors

        People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
The "actor network theory" approach in dealing with landscapes in historical centers
...Show More Authors

The historical center's landscape suffers from neglect, despite their importance and broad capabilities in enhancing the cultural value of the historical center, as landscape includes many heterogeneous human and non-human components, material and immaterial, natural and manufactured, also different historical layers, ancient, modern and contemporary. Due to the difference in these components and layers, it has become difficult for the designer to deal with it. Therefore, the research was directed by following a methodology of actor-network theory as it deals with such a complex system and concerned with an advanced method to connect the various components of considering landscape as a ground that can include various elements and deal wi

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 20 2025
Journal Name
Iraqi Journal Of Agricultural Sciences
PURIFICATION OF PHYTASE PRODUCED FROM A LOCAL FUNGAL ISOLATE AND ITS APPLICATIONS IN FOOD SYSTEMS
...Show More Authors

View Publication
Publication Date
Sat Jan 09 2021
Journal Name
Political Sciences Journal
Obstacles to reforming the Security Council and new international changes
...Show More Authors

The international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.

View Publication Preview PDF
Crossref